Soc Concepts
Soc Concepts
Soc Concepts
- SOC analyst
- SOC engineer
- SOC operator
Process
- Incident triage process: categorizing the incidents and set the risk level
- Incident closure process: testing and verifying that the vulnerability has
been successfully fixed
- EDR/XDR
- IPS/IDS
- Vulnerability scanners
SOC models
- An in-house model, where all the resources, technology, processes, and
SOC employee training are managed within the organization.
1- Security information and event management (SIEM), one of the critical part
of a SOC, it’s a security solution that provides the real time logging of events
in your environment, and filter the data that it collects and creates alerts for
any suspicious events.
So, organizations use SIEM to get complete visibility and control over what
is happening on their network in real-time.
SEM (security event management) carries out analysis of the event and logs
data in real-time to provide event correlation, threat monitoring, and
incident response.
SIM (security information management) retrieves and analyses log data and
generate a report.
SIEM collects log and event data that is generated by host systems, security
devices, and applications throughout an organization’s network
infrastructure and collating it on a centralized platform. (Data collector =
event collector + flow collector)
Then, identifies this data and sorts it into categories, such as malware
activity, failed and successful logins, and other potentially malicious activity.
(Data processing = event processor + flow processor)
When software identifies activity that could signify a threat, alerts are
generated to indicate a potential security issue. These alerts can be set
either low or high priority using pre-defined rules.
4- So, SIEM solutions provide a powerful method of threat detection, real-time
reporting, and monitoring, long term analytics of security logs and events
5- The main difference between SIEM and IDS systems is that SIEM tools
facilitate event correlation to identify patterns that might indicate an attack
has occurred while IDS doesn’t.
What is SOAR?
- an abbreviation of Security orchestration, automation, responses.,
Which is a tool that allows the company to integrate multiple resources
into a single location.